Difference between revisions of "Datasets"
From Security Unileon
SecurityAdm (talk | contribs) |
SecurityAdm (talk | contribs) |
||
Line 9: | Line 9: | ||
:'''[2] Netflow data without sampling for validation. 50% Bening traffic, 50% Slow Scan ports attack''' | :'''[2] Netflow data without sampling for validation. 50% Bening traffic, 50% Slow Scan ports attack''' | ||
::* https://doi.org/10.5281/zenodo.4106738 | ::* https://doi.org/10.5281/zenodo.4106738 | ||
+ | |||
:'''[3] Netflow data with sampling 1/1000 for training . 50% Bening traffic, 50% Scan ports attack''' | :'''[3] Netflow data with sampling 1/1000 for training . 50% Bening traffic, 50% Scan ports attack''' | ||
::* https://doi.org/10.5281/zenodo.4600638 | ::* https://doi.org/10.5281/zenodo.4600638 | ||
+ | |||
+ | |||
+ | |||
+ | :'''[4] Netflow data with sampling 1/1000 for test . 50% Bening traffic, 50% Scan ports attack''' | ||
+ | ::* https://doi.org/10.5281/zenodo.5849356 | ||
+ | |||
+ | |||
+ | |||
+ | :'''[5] Netflow data with sampling 1/500 for training . 50% Bening traffic, 50% Scan ports attack''' | ||
+ | ::* https://doi.org/10.5281/zenodo.5849306 | ||
+ | |||
+ | |||
+ | |||
+ | :'''[6] Netflow data with sampling 1/500 for test . 50% Bening traffic, 50% Scan ports attack''' | ||
+ | ::* https://doi.org/10.5281/zenodo.5849329 | ||
+ | |||
+ | |||
+ | |||
+ | :'''[7] Netflow data with sampling 1/250 for training . 50% Bening traffic, 50% Scan ports attack''' | ||
+ | ::* https://doi.org/10.5281/zenodo.5849288 | ||
+ | |||
+ | |||
+ | |||
+ | :'''[8] Netflow data with sampling 1/250 for test . 50% Bening traffic, 50% Scan ports attack''' | ||
+ | ::* https://doi.org/10.5281/zenodo.5849262 | ||
+ | |||
+ | |||
+ | |||
+ | :'''[9] Netflow data with sampling 1/1000 collected from RedCAYLE . 50% Bening traffic, 50% Scan ports attack''' | ||
+ | ::* https://doi.org/10.5281/zenodo.5849375 | ||
+ | |||
+ | |||
+ | |||
+ | :'''[10] Netflow data with sampling 1/1000 collected from RedCAYLE . 50% Bening traffic, 50% Scan ports attack''' | ||
+ | ::* https://doi.org/10.5281/zenodo.5849375 | ||
+ | |||
+ | |||
+ | :'''[11] Netflow data without sampling SQLIA for training . 50% Bening traffic, 50% SQL Injection Attack''' | ||
+ | ::* https://doi.org/10.5281/zenodo.5849375 | ||
+ | |||
+ | |||
+ | :'''[12] Netflow data without sampling SQLIA for test . 50% Bening traffic, 50% SQL Injection Attack''' | ||
+ | ::* https://doi.org/10.5281/zenodo.6906911 |
Revision as of 08:46, 28 November 2022
NetFlow
- [1] Netflow data without sampling for training. 50% Bening traffic, 50% Scan ports attack
- [2] Netflow data without sampling for validation. 50% Bening traffic, 50% Slow Scan ports attack
- [3] Netflow data with sampling 1/1000 for training . 50% Bening traffic, 50% Scan ports attack
- [4] Netflow data with sampling 1/1000 for test . 50% Bening traffic, 50% Scan ports attack
- [5] Netflow data with sampling 1/500 for training . 50% Bening traffic, 50% Scan ports attack
- [6] Netflow data with sampling 1/500 for test . 50% Bening traffic, 50% Scan ports attack
- [7] Netflow data with sampling 1/250 for training . 50% Bening traffic, 50% Scan ports attack
- [8] Netflow data with sampling 1/250 for test . 50% Bening traffic, 50% Scan ports attack
- [9] Netflow data with sampling 1/1000 collected from RedCAYLE . 50% Bening traffic, 50% Scan ports attack
- [10] Netflow data with sampling 1/1000 collected from RedCAYLE . 50% Bening traffic, 50% Scan ports attack
- [11] Netflow data without sampling SQLIA for training . 50% Bening traffic, 50% SQL Injection Attack
- [12] Netflow data without sampling SQLIA for test . 50% Bening traffic, 50% SQL Injection Attack